CVE-2023-6151

7.5 HIGH

📋 TL;DR

This vulnerability in ESKOM Computer's e-municipality module allows attackers to misuse privileged APIs to collect user-provided data. It affects all systems running e-municipality module versions before v.105. Municipal organizations using this software are primarily at risk.

💻 Affected Systems

Products:
  • ESKOM Computer e-municipality module
Versions: All versions before v.105
Operating Systems: Not specified in CVE
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments of the e-municipality module before the patched version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could exfiltrate sensitive citizen data, manipulate municipal records, or gain unauthorized access to administrative functions.

🟠

Likely Case

Unauthorized data collection from users, potentially exposing personal information submitted through municipal services.

🟢

If Mitigated

Limited impact with proper API access controls and network segmentation in place.

🌐 Internet-Facing: HIGH - The e-municipality module typically interfaces with public users for municipal services.
🏢 Internal Only: MEDIUM - Internal administrative interfaces could also be vulnerable if exposed.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires understanding of the privileged APIs and how to misuse them. No public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v.105

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-23-0664

Restart Required: Yes

Instructions:

1. Download e-municipality module v.105 from ESKOM Computer. 2. Backup current installation. 3. Apply the update following vendor documentation. 4. Restart the application/service.

🔧 Temporary Workarounds

Restrict API Access

all

Implement strict access controls on privileged APIs to limit exposure.

Network Segmentation

all

Isolate the e-municipality module from untrusted networks.

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all user-provided data
  • Deploy web application firewall (WAF) rules to detect and block API misuse patterns

🔍 How to Verify

Check if Vulnerable:

Check the installed version of e-municipality module via administrative interface or configuration files.

Check Version:

Check application configuration or vendor-provided version check utility.

Verify Fix Applied:

Confirm version is v.105 or later and test privileged API access controls.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API calls to privileged endpoints
  • Unexpected data collection patterns
  • Multiple failed authentication attempts to administrative APIs

Network Indicators:

  • Unusual outbound data transfers from the e-municipality server
  • Suspicious API request patterns

SIEM Query:

source="e-municipality" AND (event_type="api_call" AND api_endpoint CONTAINS "privileged")

🔗 References

📤 Share & Export